General

  • Target

    66e8ed7eb5c8cc1135f3d49940933583a8e42d959e1013c23f6cadf17e7d074b

  • Size

    1.0MB

  • Sample

    230525-ral3hsbc2s

  • MD5

    b7f58db06e6337252ca2b1a37e0552c6

  • SHA1

    49651353b8d40058bfea7ed4be5482f160ed2edf

  • SHA256

    66e8ed7eb5c8cc1135f3d49940933583a8e42d959e1013c23f6cadf17e7d074b

  • SHA512

    7cfcc985f6fed68ce8a8d2f5a65ed08bd46b01c2beea4076b70583f83a54831fbe83f0beebbe0e65c12fc45ba3e084c1676e9fa4a2da3b1722d7058c87df2b27

  • SSDEEP

    24576:3yuSSavBVqBD2ukgDslO0lfQn4yc0w0NC784ls1bUo:CuABVqBD2ukgqYdpO844bU

Malware Config

Extracted

Family

redline

Botnet

lina

C2

83.97.73.122:19062

Attributes
  • auth_value

    13523aee5d194d7716b22eeab7de10ad

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Targets

    • Target

      66e8ed7eb5c8cc1135f3d49940933583a8e42d959e1013c23f6cadf17e7d074b

    • Size

      1.0MB

    • MD5

      b7f58db06e6337252ca2b1a37e0552c6

    • SHA1

      49651353b8d40058bfea7ed4be5482f160ed2edf

    • SHA256

      66e8ed7eb5c8cc1135f3d49940933583a8e42d959e1013c23f6cadf17e7d074b

    • SHA512

      7cfcc985f6fed68ce8a8d2f5a65ed08bd46b01c2beea4076b70583f83a54831fbe83f0beebbe0e65c12fc45ba3e084c1676e9fa4a2da3b1722d7058c87df2b27

    • SSDEEP

      24576:3yuSSavBVqBD2ukgDslO0lfQn4yc0w0NC784ls1bUo:CuABVqBD2ukgqYdpO844bU

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks